[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

127571

 
 

909

 
 

105400

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 13422 Download | Alert*

The host is installed with Microsoft SharePoint Foundation 2013 or Microsoft SharePoint Server 2013 and is prone to a elevation of privilege vulnerability. The flaw is present in the application, which fails to handle a specially crafted app that uses the SharePoint extensibility model to execute arbitrary JavaScript on behalf of the user. Successful exploitation allows attackers to execute arbitr ...

The host is installed with Internet Explorer 10 and is prone to a memory corruption vulnerability. A flaw is present in the application , which fails to properly access objects in memory. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Internet Explorer 9 or 10 and is prone to a memory corruption vulnerability. A flaw is present in the application , which fails to properly access objects in memory. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with vlc media player before 0.9.0 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a large fmt chunk in a WAV file. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with VideoLAN VLC Media Player before 0.8.6g and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to handle a malicious library under the modules/ or plugins/ subdirectories of the current working directory. Successful exploitation allows local users to execute arbitrary code.

The host is installed with VideoLAN VLC Media Player before 0.8.6f and is prone to a stack-based buffer overflow vulnerability. The flaw is present in the application, which does not properly handle a long subtitle in an SSA file. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with VideoLAN VLC Media Player before 0.8.6f and is prone to a denial of service vulnerability. The flaw is present in the application, which does not properly handle a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with VideoLAN VLC Media Player before 0.8.6f and is prone to multiple integer overflows vulnerability. The flaws are present in the application, which does not properly handle the (1) MP4 demuxer, (2) Real demuxer, and (3) Cinepak codec. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with VideoLAN VLC Media Player before 0.8.6f and is prone to integer overflow vulnerability. A flaw is present in the application, which does not properly handle a crafted MP4 RDRF box that triggers a heap-based buffer overflow. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with VideoLAN VLC Media Player 0.8.6d and earlier and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long string. Successful exploitation allows attackers to cause a denial of service.


Pages:      Start    1175    1176    1177    1178    1179    1180    1181    1182    1183    1184    1185    1186    1187    1188    ..   1342

© SecPod Technologies